Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-21412

Опубликовано: 13 фев. 2024
Источник: msrc
CVSS3: 8.1
EPSS Критический

Описание

Internet Shortcut Files Security Feature Bypass Vulnerability

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.

How could an attacker exploit the vulnerability?

An unauthenticated attacker could send the targeted user a specially crafted file that is designed to bypass displayed security checks. However, the attacker would have no way to force a user to view the attacker-controlled content. Instead, the attacker would have to convince them to take action by clicking on the file link.

Обновления

ПродуктСтатьяОбновление
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows 11 version 21H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

Yes

Latest Software Release

Exploitation Detected

DOS

N/A

EPSS

Процентиль: 100%
0.93676
Критический

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
больше 1 года назад

Internet Shortcut Files Security Feature Bypass Vulnerability

CVSS3: 8.1
github
больше 1 года назад

Internet Shortcut Files Security Feature Bypass Vulnerability

CVSS3: 8.1
fstec
больше 1 года назад

Уязвимость функции Internet Shortcut Files Security операционных систем Windows, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 100%
0.93676
Критический

8.1 High

CVSS3